FREE TO VIEW


« Back to News

2017-03-30

Hackers Threaten To Attack Israel's Cyber Infrastructure

People associated with the Anonymous hackers' organisation are threatening to attack Israel's cyber infrastructure on April 7th.

2017-03-30

Hong Kong’s 3.7 Million Voters Exposed in Massive Breach

Hong Kong has suffered its biggest ever data breach after the personal details 3.7 million voters were lost on stolen laptops.

2017-03-29

WikiLeaks Dump Shines Light On US Intelligence’s Zero-Day Policy

Zero Days exploits used to create and promulgate a software patch are goldmines for US intelligence agencies.

2017-03-29

Board-level Cyber Literacy Is Low, Discomfort High

Business leaders who continue to view cybersecurity as a matter for the IT department leave their companies exposed to major risks.

2017-03-29

Drones For Rail & Road Tunnel Inspections

Road & rail tunnels must be inspected regularly to detect anomalies. Singapore thinks drones can replace manned inspection teams for this task.

2017-03-29

Google Search For A Fraud Victim

US judge orders Google to provide information on any internet user found to have searched for one of four variations of a fraud victim’s name.

2017-03-28

Cybersecurity’s Human Side Is A Problem

The challenge in building cybersecurity resilience is that it is not only about software, code and laws but especially about people.

2017-03-28

Security & Encryption After Edward Snowden

Four years after the renegade NSA employee first leaked details of its secret international surveillance activities, Snowden still makes news.

2017-03-27

A Quick Tour Of Cybercrime’s Underground

The evolution of cybercrime has hit a peak with ransomware and Bitcoin. One of the strange features of this is how much of it is in public.

2017-03-24

Flight Ban On Laptops 'sparked by IS threat'

Airplane Mode: Advances in electronics now mean that just about anything with a power source can be turned into an explosive.

2017-03-24

Tomorrow's Smart Cities Will Be Data Driven

Over 70% of the world's population will live in urban areas by 2050 - but don't think that means you will be able to get lost in the crowd.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

E-Tech

E-Tech

E-Tech has been providing system support and information technology consulting services including Internet and Network Security assessments.

Magnet Forensics

Magnet Forensics

Magnet Forensics' family of digital forensics products are used globally by thousands of law enforcement, military, government and corporate customers.

Crest International

Crest International

Crest is focused on professionalizing the technical cyber security market whilst driving quality and standards of organizations that operate within it.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

Cobalt Strike

Cobalt Strike

Cobalt Strike is penetration testing software designed to execute targeted attacks.

GE Digital

GE Digital

GE Digital is a leading software company for the Industrial Internet. Products include Industrial Cyber Security for Operational Technology (OT).

Surevine

Surevine

Surevine builds secure, scalable collaboration solutions for the most security conscious organisations, enabling collaboration on their most sensitive information.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

EOL IT Services

EOL IT Services

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

CornerStone

CornerStone

CornerStone is an award winning, independent risk, cyber and security consulting firm providing a range of Risk Management, Security Design and Implementation Management Services.

AWARE7

AWARE7

IT security for human and machine. With the help of our products and services, we work with you to increase the IT security level of your organization.

ADNET Technologies

ADNET Technologies

ADNET Technologies is a SOC 2, Type II Compliant IT management and cybersecurity firm.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

DeepSurface Security

DeepSurface Security

DeepSurface is the first risk-based vulnerability management platform that allows cybersecurity teams to automate the process of analyzing and prioritizing vulnerabilities.